wow–a 1c deal saving from groupon

 

 

 

image

Posted in dunno

cortana and MLS search

 

 

image

Posted in cortana

westminster trial

With the javascript universal windows store app that comes with visual studio community, I could follow the instructions as given

image

See http://microsoftedge.github.io/WebAppsDocs/en-US/win10/CreateHWA.htm

Posted in Computers and Internet

bama to john : get the email message out

Hey John, remember when that comedian reduce snowden to a dick pic – and the public got that we spy on everyone, now? Well we need you to do the same, for the Chinese spying on us. We need you to go out and say: they are reading your emails. The public will get the message then. Especially the classified ones.

Its all synced up with Hilary, and her email “manufactured scandal”. Its wrong for her to received emails from others who have mentioned classified info. But, its fine for you to know that the chinese read your emails, with classified material.

We need a quick win to help out whathisname in the UK, as they ramp up their snooper’s charter (in secret, this time). Tony in Koala-land is all on board, too.

Posted in dunno

tunny cryptanalysis before the machine age

We learn that depths provided sufficient evidence to figure the chi and psi wheel patterns – which were changing quarterly or monthly, only. And , we know that before the machine age of GCCS really got going that this change pattern was amenable to hand methods of cryptanalysis.

image

image

http://www.alanturing.net/turing_archive/archive/t/t16/TR16-024.html

We also learn that the machine wheel was viewed, in the original design concept, as the daily wheel (to be changed much as in the enigma world). What is interesting is the reference to cribs, as a valid means to assist with wheel breaking (assuming that countermeasures didn’t make crib matching too hard).

fascinating to see related the chain of assumptions and deductions – that would reveal a crypto tell.

image

http://www.alanturing.net/turing_archive/archive/t/t16/TR16-025.html

Posted in colossus, crypto

colossus era cryptanalysis and cray CPUs

it was fun re-reading the general report on tunny – a couple of years after I first encountered its strange language and before I learned the core math it leverages – as taught today using our language game.

We are used, today, when decoding or error-correcting to using iterative message-passing algorithms. That is, given a parity matrix that specifies a state machine (with edges and nodes), pass beliefs (about code-breaking-related “propositions”) along the edges to act as a custom computing machine. In the case of tunny break, log-likelihoods were passed (much as today), with a particular computation of the inner product between the evolving wheel bits and their evidence valuations and each row of the “parity matrix” – which in colossus days is of course the sample of depths as 1271 spacing of the cipher tape.

What is interesting next is the architecture not only of the Manchester computer – which followed colossus – but also machines as recent as NSA’s cray computers (with custom CPUs). They of course have “secret” instructions – that compute scalar products (i.e. geometric vector angular distances, applying such as the tunny-era masks for doubting bits).

So, given that “secretly-specialized” but otherwise (fast and) general purpose CPUs have gone out of fashion when designing cryptanalytical machines, we have to really go look at the graphics processors of the 80s to see how, back then, cryptanalytical hardware was proceeding. One has to look at how the hardware pipelines supported conformal projections and calculations of complex function vector spaces – to glimpse at what the cryptanalytical capability really was – back then. With that done, one can project forward to today, knowing how raw hardware capability has evolved since the first generation of GPUs.

Posted in Computers and Internet

web authentication brokering, adal and the universal platform

image

 

looks good.

Posted in Azure AD

IKey and the UK key wrapping snooping architecture for azure

Today’s a research cloud day, so we get to look at the official support for blog encryption in encryption (along with key storage).

image

The interesting thing is to see just how much uk policy is build into the architecture (nicely arranging that useless UK-brand HSM will be effecting the wrapping operation, with UK snooper  charter access built in as a “underlying capability:’ courtesy of Microsoft azure no doubt).

Posted in azure

github “deploy” keys

The unity project build server (in their cloud service) does not appear to use OAUITH to talk to the API of the github repository. It seems to requires than one manually install SSH keys instead, as generated by unity (which does the pulling of the repo code)

image

I’m just guessing, but we install the SSH key from the unity site as a “deploy” key in the github repository.

image

This is rather different to how the dockerhub consumer bound to the github API.

Posted in build

markdown

Finally, I’ve found something that explains the .md file extension (and the syntax for the markup used for text formatting).

https://guides.github.com/features/mastering-markdown/

Posted in Computers and Internet

Google analytics

since unity cloud build connects to a github repository (that we created) and github settings per repo can connect to google analytics, we setup an analytics account:

 

image

giving

image

image

Eventually we sign away our life to Google (and NSA) and we get

image

 

UA-65697436-1

Posted in Computers and Internet

continuous build practices for deployement

In our docker tools experiments we saw how clearly tied were github and dockerhub. The latter orchestrates the building of a docker image and the updating of the repository. The former is a repository for the “source”” code of the image build process, issuing an event to dockerhub when a change was performed (that implies the need for a new build). Between the two, an OAUTH connect enables dockerhub to use the githubAPI, when pulling code and updating activities. We blogged at http://wp.me/p1fcz8-5TC .

Now lets take this a step further and ask how well such as github are supporting code builds (vs assembly builds).

For no particular reason, we install unity – a source code and project maintenance system that has little or nothing to do with our normal work. But, it does have its own cloud build service and integration with visual studio. So how do all the cloud, and source repo, and IDE tools all cooperate?

image

image

image

image

ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC/5xBob4orOMyNkFIftY5SCoG86bUOkN99pnGVI80tEZW5jwU82VBUvMLjiLXLMpfNqLyPE2Mou/U3tayQxSXqY55aHeVwYs9Z0+l2O9dMcIjz9OJCuO0MXgtYCXoIxQDojfO2MZNqCtPZ0Tuce+YtsgrHar1qcVFQoank/EZlJODlCRxMLYFeE9NBUvKd4BrODnBWFasFuRcEkDz88oBJZ0UL9E74FdMOsihD2oom1oHlmucWtn0XBf842DO79cN3saPh0Lq62CYQywpQZOUX6CSLK/ZJ1OpT3VAD5vWU+dBAnp4A16qsJYRIj4dWyLH2+wQnsH56suFsSYjWfJ+F

 

image

image

image

not having created a real project, our build fails:

image

Posted in build

API Sandbox

https://apisandbox.msdn.microsoft.com/

Posted in coding theory

trying out azure AAD to AWS (via saml)

When we logon to myapps (in a chrome private web session)

image

using amazon SP connection (which self-issues a SAML request to the microsoftonline gateway):

image

we try to fix it by assigning a cert to the SP connection:

image

and update the idp metadata in the SP:

image

major problems assigning the per-RP signing cert. Doesn’t seem to work (or at least the wizard doesn’t seem to work..)

Posted in docker

asp.net site in asp.net docker container

 

 

image

http://blogs.msdn.com/b/webdev/archive/2015/01/14/running-asp-net-5-applications-in-linux-containers-with-docker.aspx

 

once the container is partly built (from baseline images), of course the asp.net image itself builds (the project), which involves using the docker/linux version of nuget within the asp.net image to go get all the project’s own dependencies.

image

We can now access our dockerized asp.net app, running on kestrel on linux, executing as a container on the docker host itself operating on ubuntu, in a VM running in azure VM fabric.

image

Posted in docker

AWS to SAML-P IDP hosted by Azure AD

First, we configure the IDP Connection (in which AWS logically points at the IDP endpoints, learned from IDP metadata) – recalling the AWS gotchas.

image

image

Provider ARN

arn:aws:iam::385727861301:saml-provider/PPE

Provider Type

SAML

Creation Time

2015-07-20 15:13 PDT

Then we configure the SP/SP adaptor (in Ping parlance) that is a part of AWS “role” setup, per the instructions at https://msdn.microsoft.com/en-us/library/azure/dn706228.aspx

image

Attribute

SAML:aud

Value

https://signin.aws.amazon.com/saml

Looking at the SP connection (to AWS) in the AAD setup manager, we see for connection attributes:

image

Per the tutorial we add role and mail attribute name/values:

https://aws.amazon.com/SAML/Attributes/Role : arn:aws:iam::385727861301:saml-provider/PPE

https://aws.amazon.com/SAML/Attributes/RoleSessionName: mail

image

Turning now to the main parameters of the AAD-side SP connection:

image

image

using the signup wizard

image

When we try the initiating URI

GET https://myapps.microsoft.com/signin/Amazon%20Web%20Services%20(AWS)/8b1025e41dd2430ba1502ef79cd700f5 HTTP/1.1

we see a redirect to 

GET https://account.activedirectory.windowsazure.com/applications/signin/Amazon%20Web%20Services%20(AWS)/8b1025e41dd2430ba1502ef79cd700f5 HTTP/1.1

 

followed by an openid handshake (somewhat surprisingly):

 

GET https://login.microsoftonline.com/common/oauth2/authorize?client_id=0000000c-0000-0000-c000-000000000000&redirect_uri=https%3A%2F%2Faccount.activedirectory.windowsazure.com%2F&response_mode=form_post&response_type=code%20id_token&scope=openid%20profile&state=OpenIdConnect.AuthenticationProperties%3D5AXRYHTy6jr_jeBhxOx1ci8tTEwmvkIqz_Z_qgR0Wd0kDa8J_Ah_1ghY2E3o3B72cF9Hx97h1pZgthNE_ouDhLKv2X1tG5rT8iQ3oGbNuEPayPfZGuBN2BjkRdk5K8VmvG1p27kiaewyGXk3-5K7zM99ZYltTUnOWq1pIBOAzbhMRfyhBryA2hn2v1Eho-enuvYr_npWUPY6F8uyf7-biS0UGqdWeA7LzNwar2ZPPyI6JKbbq9FyHRZ447KbTiJ0JUTAT7mdRl5nFMd1Xuo2p4L2MiDpu8bNk3ldJwOe37D0WmUsIYVw7fT0qnIleFIXwGXaPXSym776o8Hku4tzb1CnNS3upTE8XRjKzxvmuqiNRvBQjElwPgEeX97xeH-L8IPVEE50U-_zhF-ZCJylUg&nonce=1437431812.oLzcSLkq5lOQ8pNnCrboew&nux=1 HTTP/1.1

I’ll guess we are seeing some kind of openid connect to SAML gateway in operation.

we see the live.com IDP assert a code-grant to the gateway:

<html><head><title>Working…</title></head><body><form method=”POST” name=”hiddenform” action=”https://account.activedirectory.windowsazure.com/”><input type=”hidden” name=”code” value=”…” /><input type=”hidden” name=”id_token” value=”…” /><input type=”hidden” name=”state” value=”OpenIdConnect.AuthenticationProperties=5AXRYHTy6jr_jeBhxOx1ci8tTEwmvkIqz_Z_qgR0Wd0kDa8J_Ah_1ghY2E3o3B72cF9Hx97h1pZgthNE_ouDhLKv2X1tG5rT8iQ3oGbNuEPayPfZGuBN2BjkRdk5K8VmvG1p27kiaewyGXk3-5K7zM99ZYltTUnOWq1pIBOAzbhMRfyhBryA2hn2v1Eho-enuvYr_npWUPY6F8uyf7-biS0UGqdWeA7LzNwar2ZPPyI6JKbbq9FyHRZ447KbTiJ0JUTAT7mdRl5nFMd1Xuo2p4L2MiDpu8bNk3ldJwOe37D0WmUsIYVw7fT0qnIleFIXwGXaPXSym776o8Hku4tzb1CnNS3upTE8XRjKzxvmuqiNRvBQjElwPgEeX97xeH-L8IPVEE50U-_zhF-ZCJylUg” /><input type=”hidden” name=”session_state” value=”e2c316b5-e8fe-442c-a7c0-72053483d2f6″ /><noscript><p>Script is disabled. Click Submit to continue.</p><input type=”submit” value=”Submit” /></noscript></form><script language=”javascript”>window.setTimeout(‘document.forms[0].submit()’, 0);</script></body></html>

We then see the second phase of the gateway:

GET https://account.activedirectory.windowsazure.com/applications/redirecttoapplication.aspx?Operation=LinkedSignIn&applicationLinkName=Amazon%20Web%20Services%20(AWS)&applicationId=8b1025e41dd2430ba1502ef79cd700f5 HTTP/1.1

 

When using a live.com account we hit various problems. We get a little when swapping to admin@netmagic.onmicrosoft.com, having declared this user authorized to assert through the SP Connection. we see that out gatewaying process (that now has a user session) can pretend to be the SP and issue a SAML request:

GET https://login.microsoftonline.com/bcbf53cf-af9a-4584-b4c9-6d8b01b3781d/saml2?SAMLRequest=jVHLasMwEPwVo3v8Sh0nwjaYhkIgLSFpe%2BhtLW0agSW5Wjl9fH0dh5ZC6eM6zMzO7BQEuu143fuD2eJTj%2BSDF90aKlnvDLdAirgBjcS94Lv6es3TMOYaPUjwwILVsmRKymwuZot50zR5chGn%2BSKT2EA2nQoBmGYzFtyjI2VNyQb5oCLqcWXIg%2FEDFCfZJM4naXybpjzOeZaHyWL2cOJtgEgdsWR7aAlZUBOh84PTpTXUa3Q7dEcl8G67LtnB%2B454FJF6NMqE8EwhaHizJhRWR6eq7NyOj7V%2F79g5662wLauKMa77z2PgIx6r%2Fg5TRGfjqjivcDPYrZYb2yrxGlxZp8H%2FfC0JkxFRcrIfqRw1qLaW0iHREDr6bvoJft27egc%3D HTTP/1.1

Posted in AAD, Azure AD

docker subscription via azure marketplace

Let’s see what a packaged deployment of docker stuff gives us:

image

http://azure.microsoft.com/en-us/marketplace/partners/docker/docker-subscription-for-azure/

image

Configuring, we tryout the ssh public key method:

image

ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEAmOEBYv1j8rU93h1Oj7hG2JfRKXsux503YTZLoq3ZlvkSMjFqzNrifsItldEJlC38nrJeUCrmG4/RQQfYOf+DknPdGia6m55F2CAL7xYbBGz66CB0bJloCmfTELrh7+bCuPVJAbIZ3Q0ovEDIcWVh4RvGqi9s2TUCw4ZTwy2qQoke2L1nVqlaeC5HlzT8rr4Jf8poEdhmn9vRYwSVmh0vuXhVjcnVO8pqk6UwhB2rTAkaJBzzojQTfNd1/BGqUvxfp5gMPCxk/MdTd8SVBuvPNN7csgZBYzJZochXwCFkCMzG1UKObrH8uLlHAixlEiUqsSDmByA2T9JxyqKBvHMjsw== rsa-key-20150720

image

 

due to buy problems, this is as far as I could get, today.

Posted in docker

docker azure cli

 

azure cli in linux-docker-host container:

image

http://azure.microsoft.com/en-gb/documentation/videos/treating-the-azure-cli-as-a-docker-containers-to-speed-development/

Posted in docker

exposing dockerised apache on ubuntu page, from azure

Recall that we are running an ubuntu host in azure vm fabric, with azure extensions for docker.

image

we built an apache-enhanced ubuntu image and launched it on that docker host.

 

###########################################
# Dockerfile to build an apache2 image
###########################################
# Base image is Ubuntu
FROM ubuntu:14.04

# Author: Dr. Peter
MAINTAINER Dr. Peter <peterindia@gmail.com>

# Install apache2 package
RUN apt-get update && \
     apt-get install -y apache2 && \
     apt-get clean

# Set the log directory PATH
ENV APACHE_LOG_DIR /var/log/apache2

# Launch apache2 server in the foreground
ENTRYPOINT [“/usr/sbin/apache2ctl”, “-D”, “FOREGROUND”]

 

To build the image, we use

docker build -t apache2 .

to run the image in a container with exposed endpoints, we use

docker run -d -p 80:80 apache2

To ensure that the container hosts own port 80 is itself exposed as an azure endpoint, we configure azure (to expose the docker hosts port 80..,)

image

 

allowing us to interact with http://pwdocker3.cloudapp.net/ from the public internet:

image

End.

Posted in docker

visual studio online load testing

Using our home_pw@msn.com credential set and licensing, lets do a load test in the cloud.

First we create a load test runner – in the visual studio online environment. This means creating the environment, tied to home_pw@msn.com, and  then configuring visual studio  to bind to it.

image

image

image

Now we follow instructions:

https://code.msdn.microsoft.com/Getting-started-with-17a52e95

Posted in testing

playing with bitbucket

Let’s find out what bitbucket is and to what it integrates.

image

image

image

webhosting – link hosting site to source repo

image

We have basically imported the repo we made earlier in the day on github to bitbucket (once we oauth-authorized bitbucket to make API calls to the github service endpoint)

image

Posted in docker

automated build of docker images, leveraging github

lets learn to automatically build a docker image, using the dockerhub task runner, sourced to a github sources code repository … whose content we manage using the file-centric github client for windows.

image

image

 

We go clean up our github test repositories and create a new one – ready to be integrated with dockerhub’s automated build process.

image

https://github.com/homepw/dockerautomationbuild

 

image

image

image

 

To push the dockerfile, we make windows github client be a client of the github repository:

image

image

to this we add our Dockerfile (so once that this repo is pulled by dockerhub the automated build process of dockerhub can build its image).

image

image

image

Lots of the above needed to be done again, cleanly. But the principles are correct.

We end up with github having pushed the build instructions to the task runner

image

image

finally, we can manually pull and run the image in our linux host, dockerized in azure

image

Posted in docker

docker build script

pwilliams@pwdocker3:~$ cat >Dockerfile
FROM busybox:latest
CMD echo Hello World!!

pwilliams@pwdocker3:~$ cat Dockerfile
FROM busybox:latest
CMD echo Hello World!!

pwilliams@pwdocker3:~$ docker build .

Sending build context to Docker daemon 20.99 kB
Sending build context to Docker daemon
Step 0 : FROM busybox:latest
latest: Pulling from busybox
cf2616975b4a: Pull complete
6ce2e90b0bc7: Pull complete
8c2e06607696: Already exists
busybox:latest: The image you are pulling has been verified. Important: image verification is a tech preview feature and should not be relied on to provide security.
Digest: sha256:38a203e1986cf79639cfb9b2e1d6e773de84002feea2d4eb006b52004ee8502d
Status: Downloaded newer image for busybox:latest
—> 8c2e06607696
Step 1 : CMD echo Hello World!!
—> Running in 4141dfc3a0ce
—> 8e51f94add31
Removing intermediate container 4141dfc3a0ce
Successfully built 8e51f94add31

 

pwilliams@pwdocker3:~$ ^C
pwilliams@pwdocker3:~$
pwilliams@pwdocker3:~$ docker run 8e51f94add31
Hello World!!

Posted in docker

posting image from azure docker host to docker hub repo–and testing a pull/run

Having created a local image, with name homepw/ub, and a reposoitory in docker hub with the name homepw/ub1, we wish to upload the local image.

So. first we “login” to docker bug from the docker client command line tool (which is obviously a different login session to the web session on the dockerhub webapp). we can guess the command line login is a resource-owner grant whereas the webapp login is a authorization_grant, in oauth2 terms.

 

image

pwilliams@pwdocker3:~$ docker login
Username: homepw
Password:
Email: home_pw@msn.com
WARNING: login credentials saved in /home/pwilliams/.docker/config.json
Login Succeeded

some kind of token store retains credentials (vs login values)

{
        “auths”: {
                “https://index.docker.io/v1/”: {
                        “auth”: “aG9tZXB3OkZvemllYmlzYWIhMjM0NQ==”,
                        “email”: “home_pw@msn.com”
                }
        }
}

 

since we have a locally committed homepw/ub and have learned we need a docker hub repo of the same name (so we can push the locally committed image), we create another (Deleting ub1)

image

 

we see at the docker command line (running on a docker host, on a linux machine hosted in azure to which azure docker extensions were added, recall)

pwilliams@pwdocker3:~/.docker$ docker push homepw/ub
The push refers to a repository [homepw/ub] (len: 1)
b1241102e845: Image already exists
d2a0ecffe6fa: Image successfully pushed
29460ac93442: Image successfully pushed
b670fb0c7ecd: Image successfully pushed
83e4dde6b9cf: Image successfully pushed
Digest: sha256:48b17e16f16001df36b1a60ef29ec5dd4b067a060d14a8a62789859f2a3b4071

We now delete all locally running processes and the images, so we might rebuild things having pulled from the docker hub repo.

pwilliams@pwdocker3:~/.docker$ docker run -i -t homepw/ub /bin/bash
Unable to find image ‘homepw/ub:latest’ locally
latest: Pulling from homepw/ub

83e4dde6b9cf: Pull complete
b670fb0c7ecd: Pull complete
29460ac93442: Pull complete
d2a0ecffe6fa: Pull complete
b1241102e845: Already exists
Digest: sha256:48b17e16f16001df36b1a60ef29ec5dd4b067a060d14a8a62789859f2a3b4071
Status: Downloaded newer image for homepw/ub:latest
root@c376a47b4f85:/# cd /home
root@c376a47b4f85:/home# ls
abc  cde  fgh
root@c376a47b4f85:/home#

Posted in docker

request bin from docker

we were able to associate with our repository image in the dockerhub a webhook – and test it against a webhooked site : a requestbin URI.

image

https://registry.hub.docker.com/u/homepw/ubuntu_wget/settings/webhooks/

 

image

http://requestb.in/1hiwmb01?inspect

Posted in coding theory

docker info on the azure linux vm, with docker engine

So let’s review what we have achieved.

With this post we learned how to enroll with dockerhub. That is, we can now login using username/password (home_Pw@msn.com/pwd)

image

at the registry, we see such as the asp.net image.

image

https://registry.hub.docker.com/u/microsoft/aspnet/

 

Let’s read a book

image

and lets destroy our old dockerizzed ubuntu host in azure and replace it with an all new one:

imageimage[24]

putty, to pwdocker3.cloudapp.net (port 53658, not default of 22, as learned from the endpoints tab of the azure settings for the vm)

image

on our windows 10 tablet, lets install the docker client – even though we will be using the local docker client on that new ubuntu OS instance.

image

image

https://github.com/boot2docker/windows-installer/releases

The docker info says

pwilliams@pwdocker3:~$ docker info
Containers: 0
Images: 0
Storage Driver: aufs
Root Dir: /var/lib/docker/aufs
Backing Filesystem: extfs
Dirs: 0
Dirperm1 Supported: true
Execution Driver: native-0.2
Logging Driver: json-file
Kernel Version: 3.16.0-43-generic
Operating System: Ubuntu 14.10
CPUs: 1
Total Memory: 1.639 GiB
Name: pwdocker3
ID: EA3B:4KQV:ZIRR:2Z34:DKA2:2GPJ:FGVW:MAN5:KHDR:426N:R3O2:HUUM
WARNING: No swap limit suppor

 

trying to do something half useful with all this, we follow page

image

pwilliams@pwdocker3:~$ sudo docker pull busybox
latest: Pulling from busybox
cf2616975b4a: Pull complete
6ce2e90b0bc7: Pull complete
8c2e06607696: Already exsts
busybox:latest: The image you are pulling has been verified. Important: image verification is a tech preview feature and should not be relied on to provide security.
Digest: sha256:38a203e1986cf79639cfb9b2e1d6e773de84002feea2d4eb006b52004ee8502d
Status: Downloaded newer image for busybox:latest

 

and we can print hgello world!

pwilliams@pwdocker3:~$ docker images
REPOSITORY          TAG                 IMAGE ID            CREATED             VIRTUAL SIZE
busybox             latest              8c2e06607696        12 weeks ago        2.433 MB

pwilliams@pwdocker3:~$ sudo docker run busybox echo “Hello World!”
Hello World

Posted in docker

PCI DSS: A Practical Guide to implementing and maintaining compliance, Third Edition By: Steve Wright

I like this one.

image

http://my.safaribooksonline.com/9781849281881/chapter07_html?percentage=0&reader=html#X2ludGVybmFsX0h0bWxWaWV3P3htbGlkPTk3ODE4NDkyODE4ODElMkZiYWNrbWF0dGVyMDJfaHRtbCZxdWVyeT0=

Posted in pci

bitcoin mining on my battery-powered mobile windows phone

so far I’ve earned something in my own mining “pool”

WIN_20150710_16_03_19_Pro

Posted in bitcoin

gravatar and bitcoin

I’ve never bothered with bitcoins till now (since I remember how cybercash and its startup coin concept fell foul of national policies on minting cash…). But, perhaps its time to try it out, and create a “wallet” – mostly to see how the wallet tools and services integrate with membership systems.

Lets recall that one of the main drivers for even augmenting such as quickbooks with a membership system (in which 500 realtors are listed) is so its easyt and effective for the realtor to pay dues to that local realty association (and possibly also fund NAR’s PAC)

 image

in windows, we are directed to a particular wallet provider, which on windows 10 (preview) installation gives:

image

which is apparently really a chrome browser plugin (for the version of chrome running on windows)

image

image

chrome plugin

image

Since this is just an app, we need a serer side account:

image

image

 

after creating various crypto objects (including rubbish like PGP), we see it even requires specifically google authentication :

image

 

This we did, on a windows phone, using the Authenticator app (based on google’s own library code, apparently). We took a photo of the pattern, this populated the apps userid and secret. We cite the code shown on the phone to the web page, as you would expect, and get to the next phase of enrollment:

image

image

There appear to be some interesting 2-factor ideas, based on moving authentication code producers between devices. To be honest, I didn’t quite understand this, first time through! But, we will.

on our windows phone, we have been running a bitcoin miner, which created an address: 1J8RN59iB48upe6HPRywTE9w2Y3FFBYAsA, which I think I can add toe the account, so I can send it bitcoins!

Who knows!

anyways, we see just how tightly integrated it is with the phones two factor coding system, to send some coinage from the wallet to the account:

image

c

Posted in bitcoin

Gravatar and wordpress integration; a lightweight membership system for real estate?

On the dockerhub profile page, there was an option to assign a gravatar by specifying the email address handle (that implies the gravatar image set).

we see that one logs into the gravatar site itself using a wordpress IDP account:

image

image

 

image

image

what we are doing here is asking the question: so what if you do not have a Rapattoni magic (style) membership system? What if you membership system is merely a “membership plugin” to something one of two thousand small realty boards may necessarily have – such as an deployment of quickbooks?

If one wanted to build a lightweight membership plugin that could compete with a quickbooks membership module (which is little more than an address book for registered accounts of accounts payable (the users!), with some schema fields specific to real estate), could one be using the “web membership system”?

wqe can see what a modern web-centric membership system entails, when looking at features beyond the gravatar and the profile page. We can see the connections to “verified services, for example, for which we try out the linkedin integration:

 

image

image

Here we see that the oauth integration happens not only to requires a login to the linked in account, but the gravatar carries with the act of “connecting” across sites – something that goes beyond the oauth model. Note how the oauth integration ALSO allows for signup to the linkedIn service (should that necessary).

Of course, the kinds of older membership systems seen in US realty have no such feature set – despite realty being an entirely “networking business” – but a business that has resisted adopting the web technologies (for networking and membership) to date.

image

We also connected to facebook –which gave us a facebook login session obviously – similarly.

Then, we happened to opt for a goodread connection, too, which took us to its login page which happens to be facebook enabled (and an automatic goodreads session was thus created). This automatically completed most of the Oauth handshake, which we see back on the goodreads OP:

image

image

Since we have since writing the post got a bitcoin address, we can try adding it to the gravatar’s profile area for cyber currencies

 

image

image

Posted in wordpress